|
||||||
|
||
|
Home > Exploit software |
|
|
871. | JNIWrapper 3.1 (jniwrapper.com) | ||
JNIWrapper is the technology that eliminates difficulties in working with the native code from Java programs using standard Java Native Interface approach. With JNIWrapper there is no need for you to create native code libraries to call a function of the operating system API or a function from any dynamic | |||
Updated: 2, 2006 | Rating: 63 | Author: JNIWrapper Team | Size: 3601 kb | Commercial Go to category: Development > Components & Libraries Similar programs | |||
872. | jPictureSqueezer 1.02 (gamestry.com) | ||
jPictureSqueezer is a powerful tool which allows developers to create image resource files and access stored images through API in their J2ME applications. J2ME platform is very limited in resources. One of the limitation in many J2ME systems is the size of jar file. Many current MIDP devices, for example, J2ME platform is very limited in resources. One of the limitation in many J2ME systems is the si | |||
Updated: 3, 2005 | Rating: 16 | Author: Pavel Prokonich | Size: 718 kb | Shareware Go to category: Development > Other Similar programs | |||
873. | jWorkbook 2.0 (sjsoft.com) | ||
jWorkBook: Get Database information directly into your spreadsheet Now a quick way to get the information that is currently in your system databases directly into your spreadsheet. jWorkbook is an Excel Add-In that enables you to build powerful queries to access the information directly and see the | |||
Updated: 9, 2005 | Rating: 42 | Author: Nicholas Hurley | Size: 1536 kb | Freeware Go to category: Business > Databases & Tools Similar programs | |||
874. | KeyedAccess for MS Access 2.0 (peterssoftware.com) | ||
KeyedAccess is a module for Microsoft Access that allows you to generate and validate 16 digit Reg ID/Product Keys, or to generate an installation-specific Serial Number on the end-user's computer which can be unlocked with a corresponding Unlock Code. Using KeyedAccess means you can create shareware-type | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 774 kb | Demo Go to category: Development > Other Similar programs | |||
875. | KeyIC ConneX 2.0 (keyic.com) | ||
An ActiveX DLL that allows secure, real-time payment processing. Supports Sale, Auth, Capture, Refund, Recurring Transactions, and ACH (Checking account) transactions. Supports Swipe Transactions as well. Full Membership Management capabilities integrate with Recurring Transactions and can completely | |||
Updated: 9, 2005 | Rating: 0 | Author: Brian Etzel | Size: 480 kb | Freeware Go to category: Development > Source Editors Similar programs | |||
876. | LASsie (Light Application Security) for MS Access 4.3 (peterssoftware.com) | ||
LASsie (Light Application Security) is a Microsoft Access Add-In that enhances your Access application with a simplified user security system. Intended as an alternative to Access’ built-in security, LASsie offers a less complicated way to secure forms, reports, controls and certain records from unauthorized | |||
Updated: 9, 2005 | Rating: 0 | Author: Peter De Baets | Size: 770 kb | Shareware Go to category: Development > Other Similar programs | |||
877. | Laurel Net Serial Driver (LNSD) 2.0 (itlaurel.com) | ||
While the operation of different facilities, which are connected to a computer via serial port, there may appear the necessity to start up utility program (for these facilities) not in the machine, to which the facilities connect directly, but in the remote machine, that is connected to the facility server | |||
Updated: 3, 2005 | Rating: 0 | Author: Janice Petros | Size: 290 kb | Commercial Go to category: Development > Other Similar programs | |||
878. | Laurel USB Virtual Driver 2.0 (itlaurel.com) | ||
There is a number of the equipment controlled through a serial port from a PC or a terminal. Also there is a lot of the technologies in the market allowing to operate remotely the consecutive devices through the network TCP/IP. These solutions contain, both software and the hardware. Our company as well has | |||
Updated: 3, 2005 | Rating: 0 | Author: Janice Petros | Size: 290 kb | Commercial Go to category: Development > Other Similar programs | |||
879. | Laurel Virtual Serial Driver (AVSD) 2.0 (itlaurel.com) | ||
Laurel Virtual Serial Driver is appointed for emulation of one, two or more (up to 200) serial streams. Hardware devices are not necessary. This product is based on Windows XP DDK and doesn't require using devices of other manufacturers. The whole product is created with the help of Microsoft tooling. 200) serial streams. Hardware devices are not necessary. This product is based on Windows XP DDK and doesn't require using devices of other manufacturers | |||
Updated: 3, 2005 | Rating: 0 | Author: Janice Petros | Size: 158 kb | Commercial Go to category: Development > Other Similar programs | |||
880. | Leap SE 3.0 (leapse.com) | ||
Leap SE is an advanced requirements engineering CASE tool that produces object-oriented models directly from a system requirements repository or specification (SRS). By translating English into logical models for software development, Leap SE achieves RAD from the source, dramatically shortening the systems | |||
Updated: 9, 2005 | Rating: 0 | Author: Brian Smith | Size: 3936 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
|
Home > Exploit software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|